Email Bombing: Why You Need to be Concerned

When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs

It was a cold and wet Thursday morning, sometime in early 2006. There I was sitting at the very top ...

Read More

CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution

On November 20th, 2024, Zero Day Initiative (ZDI) researchers disclosed a critical flaw in 7-Zip.

Read More

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns

Welcome to the second part of our investigation into the Rockstar kit, please check out part one ...

Read More

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) ...

Read More

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

Introduction Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that ...

Read More

How Threat Actors Conduct Election Interference Operations: An Overview

The major headlines that arose from the three most recent US presidential election cycles ...

Read More

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

Introduction In the perpetually evolving field of cybersecurity, new threats materialize daily. ...

Read More

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Trustwave's Threat Intelligence team has discovered a new malware dubbed Pronsis Loader, with its ...

Read More

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177

On September 26, 2024, security researcher Simone Margaritellidisclosed the details of four ...

Read More

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

HTML smuggling techniques have been around for quite some time. A previous Trustwave SpiderLabs’ ...

Read More

Why Do Criminals Love Phishing-as-a-Service Platforms?

Phishing-as-a-Service (PaaS) platforms have become the go-to tool for cybercriminals, to launch ...

Read More

Spam With A Political Twist: Fraudsters Are Exploiting The Election Season

The US election is less than 70 days away and threat actors are busy crafting malicious spam that ...

Read More

Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media

With the US election on the horizon, it’s a good time to explore the concept of social media ...

Read More

Exposed and Encrypted: Inside a Mallox Ransomware Attack

Recently, a client enlisted the support of Trustwave to investigate an unauthorized access incident ...

Read More

Search & Spoof: Abuse of Windows Search to Redirect to Malware

Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows ...

Read More

Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor

During a recent client investigation, Trustwave SpiderLabs found a malicious version of the ...

Read More

Fake Dialog Boxes to Make Malware More Convincing

Let’s explore how SpiderLabs created and incorporated user prompts, specifically Windows dialog ...

Read More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

UPDATE: Palo Alto Networks confirmed on Tuesday (4/16) that disabling device telemetry is no longer ...

Read More